0% found this document useful (0 votes)
7 views1 page

cloud computing pddf

n mbjl

Uploaded by

musthelp8
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views1 page

cloud computing pddf

n mbjl

Uploaded by

musthelp8
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Cloud Enabling Technologies Cloud Computing 2-9 E (CSIT-Sem-7)

1-20 E (CSTT-Sem-7) 2-6E (CSIT-Sem-7)


Introduction

Answer Answer
Answer
1. Elements of Service Oriented Architecture (SOA):
Distributed computing is a model in which components of a software S. No. RESTful web service RESTless web service
system are shared among multiple computers to improve
performance. efficiency and 1. An application that provides An application that is not based on
2 In distributed computing, each processor has its
SOA interoperability between the principle of REST.
own private memory computer systems on the
(distributed memory). Information is exchanged by passing messages internet.
between the processors.
3 2, Use REST. Use SOAP.
A distributed system allows resource sharing,
systems connected to the network.
including software by Application Service
Service
Service Bus
frontend repository 3. Support various data format Support XML format.
4 The goal of distributed computing is to make network as a such as HTML, JSON, etc.
computer.
single
4 Use ÜRL to expose business Use the service interface to expose
5. Examples of distributed systems /applications of distributed computing business logic.
logic.
are :Intranets, Internet, WWW, email. Contract Implementation Interface
5 Easier and flexible. Not easy and flexible.
Que 1.21. Differentiate between parallel computing and distributed
6 Inherits security measures Defines its own security layer and
computing. from the underlying is more secure.
transport protocols.
Answer Business logic Data
7 Consume less bandwidth and Consume more bandwidth and
S.No. Parallel computing Distributed computing resources. resources.
1. Application frontend :
1 It is a type of computation A system whose components are a. Application frontends are active elements of the SOA, delivering
in which many calculations located on different networked
or the execution of
the value of SOA to the end users.
Que 2.14. What are the advantages of REST?
computers, which communicate b They initiate and control all activity of the enterprise system.
processes are carried out and coordinate their actions by
simultaneously. passing messages to one another. 2. Service: It is a software component that encapsulates a high level Answer
2 It occurs in a single
business concept. The advantages of REST are :
It involves multiple computers. the server:
computer.
3 Contract : It provides a specification of the purpose, functionality, 1. Separation between the client and
constraints, and usage of services. interface from the
3. Multiple processors execute a The REST protocol totally separates the user
Multiple computers perform tasks 4 Interface : Functionality of the service exposed by the service to the server and the data storage.
multiple tasks at the same at the same time. clients that are connected to the service. interface to other
time. b For example, it improves the portability of the the projects, and
5. Implementation :The service implementation provides the required types of platforms, it increases the scalability of
business logic and appropriate data. It contains one or more of the be evolved
allows the different components of the developments to
4. Computer can have shared Each computer has its own
memory or distributed memory. artifacts :programs, configuration, data and databases. independently.
memory. 6. Business logic : Business process represented by the service.
7 Data: Data represented in the service used by the service. 2. Visibility, reliability and scalability :
evident
Processors communicate separation between client and server has one
5.
Computers communicate with The
with each other using a each other through the network. 8. Service repository :It registers the services and their attributes to advantage, that each development team can scale the
product
bus. facilitate the discovery of services, operation, access rights, without problem.
qualities, etc. owner,
of changes in
6. Increase the performance Allows scalability sharing 9. Service bus: Aflexible infrastructure for integrating b They can migrate to other servers or make all kinds is sent
of the system. resources and helps to perform applications and
services by :routing messages, transforming protocols between the database, provided that the data from each request
computation tasks efficiently. and service, handling business events and requestor correctly.
QoS,security, and managing the delivering them, providing
interaction among services.

2-13 E (CSIT-Sem-7) 2-22 E (CSIT-Sem-7) 2-26 E (CSIT-Sem-7) Cloud Enabling Technologies


Cloud Computing Cloud Enabling Technologies

Answer Answer Answer


Various implementation level of virtualization : Binary translation with full virtualization :
S. No. REST -SOAP 1. Instruction Set
Architecture (ISA) level: 1. Full virtualization:
1. REST is Representational SOAP is Service Oriented i. At the ISA level, virtualization is performed by i. With fullvirtualization, non-critical instructions run on the hardware
Architecture Protocol. ISAby the ISAof the host machine. emulating a given
State Transfer. directly while critical instructions are discovered and replaced with
The basic emulation method is through code traps intothe VMM tobe emulated by software.
üi. An interpreter program interprets the source interpretation.
2. It is an architecture style. It is a protocol.
instructions to target Both the hypervisor and VMM approaches are considered full
3. It usessimple HTTP protocol. It uses SOAP envelop and then instructions one by one. virtualization.
HTTP to transfer the data. iv. One source instruction may require tens or hundreds of native ii. Critical instructions are trapped into the VMM because binary
It supports many different It supports only XML format. target instructions to perform its function. This process is translation can incur a large performance overhead.
4.
slow. relatively
data format like JSON, XML, iv. Non-critical instructions do not control hardware or threaten the
YAML etc.
V For better performance, dynamic binary translation is security of the system, but critical instructions do.
Vi. This approach translates basic blocks of
desired.
5 Performance, scalability, and Slower performance and to target instructions.
dynamic source instructions V.
Therefore, running non-critical instructions on hardware not only
caching is high. scalability is bit complex, caching can promote efficiency, but also can ensure system security.
Vi. The basic blocks can also be
not possible. extended to program traces or super 2. Binary translation of guest OS requests using a VMM:
blocks to increase translation efficiency.
6. It is used widely and It is used where REST is not vi. AVirtual Instruction Set i. VMware puts the VMM at Ring 0 and the guest OS at Ring 1.
possible. Architecture (V-ISA) thus requires adding
a processor-specific software The VMM scans the instruction stream and identifies the
frequently. translation layer to the compiler. :
privileged,
2. Hardware abstraction level: control and behaviour sensitive instructions.
It is performed right on top of the üi. When these instructions are identified, they are trapped into the
Que 2.19. Explain briefly publish-subscribe model. bare
virtual hardware environment for a VM.hardware and generates a VMM, which emulates the behaviour of these instructions. The
The idea is to virtualize a method used in this emulation is called binary translation.
Answer computer's resources, such as its iv. Full virtualization combines binary translation and direct
In software architecture, publish-subscribe pattern is a message pattern, processors, memory, and VO devices so as hardware utilization execution.
1 rate by multiple users concurrently may be The guest OS is completely decoupled from the underlying
a network oriented architectural pattern, which describes how two upgraded.
different parts ofa message passing system connect and communicate 3. Operating system level : hardware. Consequently, the guest OS is unaware that it is being
virtualized.
with each other. OS-level virtualization creates isolated containers on a
2 In modern cloud architecture, applications are decoupled into smaller, physical server and the OS instances to utilize the hardwaresingle
and Ring 3 User apps Direct
independent building blocks that are easier to develop, deploy and software in data centers. execution
of user
maintain. The containers behave like real servers.
OS-level virtualization is Ring 2 requests
Publish/Subscribe (Pub/Sub) messaging provides instant event commonly used in creating virtual hosting
hardware resources among a large numberenvironments
3 to allocate
notifications for these distributed applications. of mutually distrusting
users. Ring 1 Guest OS
4
The publish-subscribe model allows messages to be broadcast to different
ii. Library Support Level Binary
parts of a system. Virtualization with library
Publish-subscribe is a sibling of the message queue paradigm, and is one possible by controlling the communication link betweeninterfaces is Ring 0 VMM translation
5 and the rest of a system through API hooks. applications of OS
part of a larger message-oriented middleware system. request
4. Library support level:
Messaging systems support both the pub/sub and message queue models Host computer
6.
Virtualization with library interfaces is possible by system hardware
in their API. For example, Java Message Service (JMS). controlling the
7. This pattern provides greater network scalability and a dynamic network communication link between applications and the rest of a system Fig. 2.30.1.
topology, with a resulting decreased flexibility to modify the publisher through API hooks.
and the structure of the published data. ii. The software tool WINE has
Windows applications on topimplemented this approach to support
of UNIX hosts.

45E (CSIT-Sem-7)
Cloud Computing 2-27 E (CSIT-Sem-7) Cloud Computing Cloud Computing 4-11 E(CIT-Sem-7)
services are OPTIMIS,
Host-based virtualization: iv. The inter cloud projects that use multi-cloud cloud management
An alternative VM architecture is to install a virtualization layer on contrail, MOSAIC, STRATOS and commercial PART-4
top of the host OS. This host OS is still responsible for managing systems.
the hardware.
4. Multi-cloud libraries : Security Overview, Cloud Security Challenges.
as a
ii. The guest OS are installed and run on top of the virtualization 1 Clients develop their own brokers by using a unified cloud API
layer. library. in a Questions-Answers
ii. Dedicated applications may run on the VMs. Certainly,some other i. Inter clouds that use libraries facilitate the usage of clouds
uniform way.
applications can also run with the host OS directly. J-clouds, Long Answer Type and Medium Answer Type Questions
ii. Examples of Several Multi-cloud Libraries are Java library
iv. Advantages of host- based architecture: Python library Apache Lib-Clouds, Ruby library Apache Delta
The user can install the VM architecture without modifying Cloud.
a.
the host OS. The virtualizing software can rely on the host OS Que 4.13. Give a schematic diagram of various cloud
Que 4.5. Explain the extended cloud computing services. security
services. This will
to provide device drivers and other low-level challenges ?
simplify the VM design and ease its deployment.
Answer
b The host-based approach appeals to many host machine Answer
configurations. Compared to the hypervisor/VMM architecture, 1 Fig. 4.5.1 shows six layers of cloud services ranging from hardware,
1 Fig. 4.13.1 represents the schematic diagram showing the hierarchy of
the cloud computing, with security challenges on both the
the performance of the host-based architecture may also be network, and collocation to infrastructure, platform, and software cloud
low. applications. computing models, deployment and service models and also the issues
related to networks.
Que 2.31. Describe para-virtualization. Cloud application (SaaS)
Cloud computing
Answer Cloud software environment (PaaS) Security challenges
Para-virtualization :
Cloud software infrastructure
Deployment models Service model
Network issues
Application Application Computational Storage Communications
resources (IaaS) (DaaS) (CaaS)
Para-virtualized Para-virtualized Browser security
guest operating Private Public| Hybrid SaaS PaaS laaS
guest operating Collocation cloud services (Laas)
system SQL injection attack
system
Hypervisor/VMM Network cloud services (NaaS) Flooding attack
Cloning and Data leakage
resource pooling problems
Hardware Hardware/Virtualization cloud services (HaaS)
XML signature
Motility of data and
Malicious attacks
element wrapping
data residuals
Fig. 2.31,1. Fig. 4.5.1. A stack of six layers of cloud services and their providers. Incomplete data
Para-virtualization needs to modify the guest operating systems. Elastic perimeter Backup and storage deletion
1 2 The top three service layers are SaaS, PaaS, and laaS.
substantial OS
Apara-virtualized VM provides special API requiring Shared multi-tenant Locks-in
2 3 The cloud platform provides PaaS, Which sits on top of the IaaS Shared technological
modifications in user applications. infrastructure. environment issues
machine
3 The virtualization layer can be inserted at different positions in a 4 The top layer offers SaaS. These must be implemented on the cloud Unencrypted data
software stack. Service hijacking
platforms provided. Although the three basic models are dissimilar in
4 Para-virtualization attempts toreduce the virtualization overhead, and usage, they are built one on top of another. Authentication and Virtual machine
kernel.
thus improve performance by modifying only the guest OS 5 The implication is that one cannot launch Sass applications with a cloud identity management
hopping
5 The guest operating systems are para-virtualized. They are assisted by platform. The cloud platform cannot be built if compute and storage
OS instructions
an intelligent compiler to replace the non-virtualizable infrastructures are not there. Fig. 4.13.1. Classification of security
challenge.
by hypercalls.

You might also like